By Topic

A certificate - Based signature scheme for secure mobile communications

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Serb, Mihai ; Computer Science Department, Military Technical Academy, Bucharest, 050141, Romania ; Togan, Mihai

In this paper we introduce a new signature scheme specially designed to address one of the most important problems of mobile communications: possible unauthorized access to private / secret keys stored on mobile terminals. Our solution is based on a relatively new concept called “certificate - based encryption” (CBE). CBE combines the best aspects of identity - based encryption (IBE) with the advantages offered by public - key encryption. Using CBE we can construct a signature scheme, that increases the level of trust in a signature created on a mobile terminal, by requiring users to acquire, before any signing operation, a proof of validity for their key pairs, from a trusted third party, in this case the Certification Authority (CA). The proof of validity is in fact a certificate, which is used as a second signing key, besides the user's private key, in the signing process. This means that the user must have authorization to create a valid signature, authorization which comes from the CA in the form of a second signing key, the certificate, which he cannot compute by himself. We present a detailed description of the signing and verification processes and of the benefits and drawbacks derived from using this scheme.

Published in:

Communications (COMM), 2010 8th International Conference on

Date of Conference:

10-12 June 2010